Comments 0

Document transcript

Red Hat’s Security Guide makes a distinction between three types of hackers. The typesof hackers are separated by colors. There are the white,

black, and grey hat hackers. Each of thewhite, black, and grey hackers has a distinction about what they focus on with computers

systems and their motivations. The definition of a hacker is complex. For example according toRed Hat, “a common trait among

most hackers is a willingness to explore in detail how computersystems and networks function with little or no outside motivation” (Redhat; 2.1. A QuickHistory of Hackers). Red Hat’s Security Guide categorizes these hackers into

three

types.

First, the

white hat hacker, “Is one who tests networks and systems to examine theirperformance and determine how vulnerable they are to intrusion” (Redhat; 2.1.1. Shades ofGrey). One of the main focuses of the white hat hacker is determining if the companies they

areemployed by have a secure security system and what adjustments need to be made. Mostly theyare checking to make sure the website is secure from intrusion.In 2008, an article in USA Todayby Greg Wiles, had the idea that there was a need for white hat hackers. “According to a surveyby the Computer Security Institute, organizations reported $52.5 million in losses in 2006because of computer security breaches” (Miles). White Hat Hackers are the only type out ofthree that do not have a personal agenda

but work strictly to test the system and report theirfindings.

Second, the black hat hackers

“Often

rely on available cracking programs and exploitwell known vulnerabilities in systems to uncover sensitive information for personal gain or toinflict damage on the target system or network” (Redhat; 2.1.1. Shades of Grey). This black hathacker is like the mainstream thought of what a hacker is, which is called a, “cracker” by mostcomputer programmers.

Lastly, is the grey hat hacker, “Who has the skills and intent of a white hat hacker in mostsituations but uses his knowledge for less than noble purposes on occasion” (Redhat; 2.1.1.Shades of Grey). Out of the threethe grey hat hacker is more difficult to understand. There isinsufficient information

to determine what work the grey hat hacker takes into consideration toact upon.

The Red Hat’s Security Guide does have distinctions between each of the three types ofhackers. However, their actions overlap on a non academic approach to the grey hat hacker,including some things the black hat hacker takes action in. They have a distinction with

each incategories but they overlap.Since the Red Hat’s Security Guide color coordinates all of thesehackers it is thought that people can distinguish the hackers based on colors and therepresentation of the colors through history. Looking at the color interpretation through the moodrings symbolism of each color. Black signifies, “This person is stressed and tense. Black is thesign of someone who is overworked

and harried.” The tense feeling behind black can besynonymous with the definition of a black hat hacker. The black hat hacker is someone whobreaks into systems without the thought of an academic purpose. So, the black hat hacker is avillain out of thethree types of hat hackers.

Moving on to the white hat mood denotes, “This person is very frustrated, possibly bored,

and may even be continued.” For the white mood person to be confused and bored can fit intothe definition for white hat hackers, sincethey are just there to do a job and that’s it.

The three forms of hackers that Red Hat’s Security Guide discusses

are aimed towardsthe colors associated with each hacker. There is some hope for the use of the color spectrum witha code of conduct or code of ethics or how we conduct ourselves in the world of remix. Onecould argue that a moral principle could appear with all the ranges of hackers and how one doesit for an academic purpose and others for private advances in their skill set. However, it is

hard todebate the use of colors and what they accredit with the changes of moods. The association of amoral code to the mood rings to each use of their skill set works by connecting each with allpoints.

The color spectrum helps to understanding the codes of ethics people perceive goes withthe hacker and to differentiate between

codes of ethics

like with the pledge of REALTORS. Allthree types of hackers have a tense feeling or stress at the same time

associating them along sidethe conduct of ethics. There are different forms of ethics that people affiliate with. One form ofconduct of ethics is the conduct realtors take. In the first article ofREALTORS Pledge ofPerformance and Service

it states, “REALTORS protect and promote their clients’ interestswhile treating all parties honestly” (Board of Realtors; Article 1). Treating all parties withhonesty is not discussed in any of the types of hackers, there is no moral for honesty. The colorspectrum differentiates from the codeof ethics for realtors.

Another code of ethics that associates more with hacking computer systems andnetworkfunctions is ethics in computing. Web designers focus on, “Many codes of ethics discuss theresponsibility of the engineer to the safety of the public” (Ethics in Computing). The code ofethics has similarities with the safety of the public because public can include everyone who isinvolved in the programming and the hacking.

The three types of hackers, color spectrum, and being capable to administer certain codesof ethics on each gives a complexity to each hacker type. When looking at past articles thatdiscuss the forms of hacker,the articles give the people an idea of what each hacker does ordoesn’t do pertaining to their interests. It is concluded that there are key points where hackerstake moral principles into consideration when performing their work. Furthermore, color moodsand placing them with the skill sets each hacker acts on shows that the colors that the Red Hatgivesmatches up

with the feelings behind the specific colors of white, black, and grey.

Red Hat’s Security Guide makes a distinction between specific types ofhackers. The typeof hackers are separated by colors. There are white, black, andgrey hackers. Each of the white, black, and grey hackers has a distinction aboutwhat they focus on with computer systems and their motivations. The definition ofa hacker is complex. For example according to Red Hat, “a common trait amongmost hackers is a willingness to explore in detail how computer systems andnetworks function with little or no outside motivation.” (Redhat; 2.1. A QuickHistory of Hackers). Red Hat’s Security Guide categorizes these hackers intotypes.

First, the white hat hacker “Is one who tests networks and systems toexamine their performance and determine how vulnerable they are to intrusion.”(Redhat; 2.1.1. Shades of Grey). One of the main focuses of the white hat hacker isdetermining if the companies they are employed by have a secure security systemand what adjustments

need to be made. Mostly they are checking to make sure thewebsite is secure from intrusion. In 2008, an article in USA Today by Greg Wiles,had the idea that there was a need for white hat hackers. In the article, “Accordingto a survey by the Compute security Institute, organizations reported $52.5 millionin losses in 2006 because of computer security breaches” (Miles, Greg). White hathackers are the only type out of the three that do not have a personal agenda but arestrictly to test the system.

Second, the black hat hackers, “Often rely on available cracking programsand exploit well known vulnerabilities in systems to uncover sensitiveinformationfor personal gain or to inflict damage on the target system or network” (Redhat;2.1.1. Shades of Grey). This type of hat hacker is like the mainstream thought ofwhat a hacker is, which called a, “cracker” by most computer programmers.

Lastly, is the grey hat hacker, “who has the skills and intent of a white hathacker in most situations but uses his knowledge for less than noble purposes onoccasion.” (Redhat; 2.1.1. Shades of Grey). Out of the three the grey hat hacker ismore difficult to understand. There is insufficient information to determine whatduties the grey hat hacker takes into consideration to act upon.

The Red Hat’s Security Guide does have distinctions between each of thethree types of hackers. However, they do overlap some of the actions on a non-academic approach to the grey hat hacker; including some things the black hathacker takes action in. They have a distinction with each in categories but theyoverlap. Overlapping does not help for someone who doesn’t understand theterminology Red Hat uses. Since the Red Hat’s Security Guide color coordinatesall of these hackers it is thought that people can distinguish the hackers based oncolors and the representation of the colors through history. Looking at the colorinterpretation through a mood rings symbolism of each color. Black signifies,“This person is stressed and tense. Black is the sign of someone who is overworkedand harried.” The tense feeling behind black can be synonymous with thedefinition of a black hat hacker.The black hat hacker is someone who breaks intosystems without the thought of an academic purpose. So, for the person hacking tobe tense could certainly be because of the repercussions from hacking a programwithout permission.

Moving on to the white mood denotes, “This person is very frustrated,possibly bored, and may even be confused.” For the white mood person to beconfused and bored can fit into the definition for white hat hacker, since they arejust there to do a job and that’s it. Moving on to the last color being grey it states,“The individual is experiencing lower level stress and is feeling anxious andnervous.” The grey mood also fits well with the grey hat hacker because a grey hathacker has academic purposes but they also don’t always use

their hacking skillsfor academic purposes.

The three forms of hackers that the Red Hat’s Security Guide discussesinclude the mood that aims towards the colors associated with each hacker. Thereis some help for the use of the color spectrum with a code

of conduct or code ofethics or how we conduct ourselves in the world of remix. One could argue that amoral principle could appear with all the ranges of hackers and how one does it foran academic purpose and others for private advances in their skill set. However, itis hard to debate the use of colors and what they accredit with the changes ofmoods. The association of a moral code to the feelings of each hacker to each useof their skill set works by connecting each with all points.

The color spectrum helps to understanding the codes of ethics peopleaccompany with the hacker and to differentiate between codes of ethics. All threeof the hacker types include a form of tense feeling or stress at the same timeassociating them along side of the conductof ethics. There are different forms ofethics that people affiliate with. One form of conduct of ethics is the conductrealtors take. In the first article ofREALTORS Pledge of Performance and Serviceit states, “REALTORS protect and promote their clients’ interests while treating allparties honestly” (Board of Realtors; Article 1). Treating all parties with honesty isnot discussed in any of the type of hackers, there is no moral for honesty. The colorspectrum differentiates from the code of ethics for realtors.

Another code of ethics that associates more with hacking computer systemsand network functions is ethics in computing. The ethics of computing focus on,“Many codes of ethics discuss the responsibility of the engineer to the safety of thepublic” (Ethics in Computing). The code of ethics has similarities with the safetyof the public because public can include everyone who is involved in theprogramming and the hacking.

The three types ofhackers, color spectrum, and being capable to administercertain codes of ethics on each gives a complexity to each hacker type. Whenlooking at past articles that discuss the forms of hacker, it gives the people an idea

of what each hacker does or doesn’t

do pertaining to their interests. It is concludedthat there are key points where hackers take moral principles into considerationwhen performing their work. Furthermore, color moods and placing them with theskill sets each hacker acts upon shows that the colors that the Red Hat gives eachmatches up with the feelings behind the specific colors of white, black, and grey.